How To Install Securify

Size: px
Start display at page:

Download "How To Install Securify"

Transcription

1 PART NO: SV-IG Securify Installation Guide

2 2008 McAfee, Inc Secure Computing Corporation. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Secure Computing Corporation. Product names used within are trademarks of their respective owners. Secure Computing and Securify are trademarks of Secure Computing Corporation, registered in the U.S. Patent and Trademark Office and in other countries. This manual, as well as the software or any Secure Computing Corporation products described in it, is furnished by Secure Computing Corporation under license and must be used or copied only in accordance with the terms of such license. The content of this manual is furnished as is for informational use only, is subject to change without notice, and should not be construed as any commitment or warranty by Secure Computing Corporation regarding the content of the manual, the software, or any products described herein. Secure Computing Corporation assumes no responsibility or liability for the content of the manual, any errors, or any inaccuracies that may appear in this manual. Except as permitted by such license, no part of this publication may be reproduced, stored in a retrieval system, transmitted, distributed, or translated in any form or by any means, electronic or mechanical, including photocopying and recording, without the prior written permission of Secure Computing Corporation, Stevens Creek Blvd., Suite 200, Cupertino, CA 95014, Attn.: Legal Department. Notice to U.S. government end users: The software and documentation are commercial items, as that term is defined at 48 C.F.R , consisting of commercial computer software, and commercial computer software documentation, as such terms are used in 48 C.F.R or 48 C.F.R , as applicable. Consistent with 48 C.F.R or 48 C.F.R , as applicable, the commercial computer software and commercial computer software documentation are being licensed to U.S. government end users as only commercial items and with only those rights as are granted to all other end users pursuant to the terms and conditions set forth in the Secure Computing commercial agreement for this software. Unpublished rights are reserved under the copyright laws of the United States. Use of this manual, software, or any Secure Computing Corporation product(s) is governed by the Secure Computing Corporation License Agreement. Secure Computing makes no warranties, express, implied, or statutory, with respect to the manual, the software, or product(s) described herein, and Secure Computing Corporation expressly disclaims all warranties, including without limitation any warranty of non infringement, merchantability, fitness for a particular purpose, informational content, or system integration. Secure Computing Corporation reserves the right to revise the information in this manual at any time without notice. Twelvth edition August, Thirteenth edition November, This document applies to V Secure Computing Corporation Stevens Creek Blvd., Suite 200 Cupertino, CA Tel Fax

3 Installation Guide Table of Contents Chapter 1 Introducing Securify Installation Related Documentation Chapter 2 Installing Securify Studio System Requirements Installing Studio Software Starting Securify Studio Chapter 3 Installing and Upgrading a Securify Distributed Login Collector System Requirements DNS Resolution Requirements Installing DLC Software Configuring the DLC Server Certificate SecurVantage Connection Log DC Connection DLC Remote Configuration Using Microsoft Management Console for Certificate Management Importing/Removing a Server or Client CA Certificate for DLC Using NTLMv2 with DLCs Contents 3

4 Securify Chapter 4 Installing Securify Monitors, Enterprise Managers, or Enterprise Global System Requirements Overview of Installation Appliance Packaging Configuring an Appliance on a Network All Appliances Monitor Product Line Flow Monitor and Flow Monitor SE Wiring an Appliance Installing the Core Appliance Software Optionally Enable a Serial Port Connection What s Next? Chapter 5 Installing Securify Enterprise Reporting About the Enterprise Reporting Hardware Configuring Enterprise Reporting on a Network Wiring an ER Gateway and ER Warehouse Installing Enterprise Reporting Software Configuring the Crystal Enterprise Software Enabling the Crystal Enterprise License Key Enabling the Crystal Enterprise Servers Enabling Auditing Configuring Report Retention Formatting the Third Hard Drive What s Next? Chapter 6 Allowing SSH Access Appendix A Upgrading Securify Software Appendix B Managing Certificates Managing Certificates with the Web Application Generating a New Self-signed Certificate Uploading a Signed Certificate and Private Key Converting PEM to PKCS# Uploading an NMSS Client Certificate on an Enterprise Manager Contents

5 Installation Guide Requiring Client Certificates Connecting with Signed Certificates Updating a Monitor Connected to an Enterprise Manager Updating an ER Gateway Connected to an Enterprise Manager Updating an Enterprise Manager Connected to Another Securify Appliance.. 74 Updating an Enterprise Global Connected to an Enterprise Manager Updating a Computer Running Studio Managing Certificates for Connections Contents 5

6 Securify 6 Contents

7 CHAPTER 1 Introducing Securify Installation This guide provides instructions for installing all Securify products, including: Installing Securify Studio on page 11 Installing and Upgrading a Securify Distributed Login Collector on page 15 Installing Securify Monitors, Enterprise Managers, or Enterprise Global on page 27 Installing Securify Enterprise Reporting on page 39 Upgrading Securify Software on page 59 Note: See Related Documentation on page 8 for information about other Securify documentation. Introducing Securify Installation 7

8 Securify Related Documentation The following diagram depicts the recommended path you should follow through the Securify documentation. Quick Start Guides These guides ship as single-page printed documents with your Securify appliance. They are designed to provide information that helps you get up and running quickly. Release Notes This document contains important information about a release, including a summary of new features, descriptions of compatibility issues, if any, installation and upgrade instructions, and descriptions of known and resolved issues. Securify Deployment Guide This guide provides an architectural overview of the Securify system, and descriptions of the Securify products. It is your introduction to the components and concepts that comprise a Securify system. It contains a glossary for Securify-related terms and information to help you get started quickly. 8 Introducing Securify Installation

9 Installation Guide Securify Installation Guide Provides instructions for installing all Securify products, including: Securify Studio Securify Distributed Login Collector Securify Monitor (all models) Securify Enterprise Manager (all models) Securify Enterprise Reporting (ER Gateway and ER Warehouse) Securify Enterprise Global Also included are instructions for uploading software updates to Securify appliances and for managing certificates. Issues related to configuring credentials for the DLC to use with your directory are covered at the end of the Securify Deployment Guide. Securify Studio User Guide Provides details regarding the features and functionality of the Studio policy development and traffic analysis application. Securify Web Application Operations Guide Provides details regarding the features and functionality of the Web application shared by the Monitor product family and Enterprise Manager products for analyzing network traffic and managing the appliance deployments. Securify Enterprise Reporting Operations Guide Provides details regarding the features and functionality of the Web application used to access the data aggregated from many Enterprise Managers, including how to archive a record of your network traffic so that you are able to produce reports covering weeks and months of logged user behaviors. Securify Enterprise Global User Guide Provides details regarding the features and functionality of the Web application that provides an overview of many Enterprise Managers, from how to arrange connectivity between the machines to the advantages of high-level monitoring across a large and geographically-dispersed network. Securify External Scanner Integration Guide Provides details regarding how to build and configure a stand-alone Nessus vulnerability scanner, as well as how to integrate it with your Securify deployment. Related Documentation 9

10 Securify 10 Introducing Securify Installation

11 CHAPTER 2 Installing Securify Studio This chapter provides instructions for installing Securify Studio (Studio). System Requirements on page 12 Installing Studio Software on page 12 Starting Securify Studio on page 14 Studio is the Securify policy development and security analysis environment. It enables: Security architects to quickly create and refine policies. Network administrators to perform detailed traffic analysis. Operations personnel to associate actions and owners with policy violations. You can use Studio alone to develop policy or, in conjunction with a Securify Monitor and the Studio Analyzer feature, to analyze real-time traffic. Installing Securify Studio 11

12 Securify System Requirements The Securify Studio software requires a system that meets these minimum hardware and software requirements: Processor running at 1GHz or better 1GB RAM (or more, to improve performance) 10 GB hard drive free space Display set to 1024x768 pixels or greater Microsoft Windows 2000 or Windows XP Installing Studio Software The Studio software is shipped on a single CD. This CD contains the preassigned password you need during the installation process. Note: Studio is incompatible with Symantec Norton Ghost. Prior to installing Studio, ensure that you do not have Norton Ghost installed on your system. If it is installed, uninstall it before proceeding with the installation of Studio. To install Studio software: 1 Make a note of the password that appears on the Studio CD before you insert it into the CD drive. 2 Backup relevant files from the Studio installation directory (such as asset files or policy files) if you are re-installing or upgrading Studio to the same directory, then delete the previous installation directory. Once Studio is installed, you can copy these files back into their respective directories. 3 Insert the Studio CD. Using Windows Explorer, display the contents of the Studio CD. 4 Double-click the setup icon. The Studio Installer starts. The Welcome window advises you to exit all other applications before continuing. 5 Click Next to display the license agreement. 6 Read the license agreement, then click Yes if you agree to accept the terms of the license agreement. 12 Installing Securify Studio

13 Installation Guide 7 Follow the instructions on your screen to: a Type your user name and company name. Click Next. b Select a location for the Studio installation. Click Next. You can accept the default location, or click Browse to select another one. If you need to run two versions of Studio at the same time, rename your current Studio directory. For example, if some of a network's Monitors are on and others are on 6.0. Otherwise, the new installation writes over the previous installation. c Specify the program group. Click Next. d Click Next again to begin installing. e Type the password from the front of the CD, then click OK. Type the password printed on your CD. 8 Click Finish when Studio is finished installing Installing Studio Software 13

14 Securify Starting Securify Studio You can start Studio the same way you start any application: from a desktop shortcut or from the Start menu. To start Studio: Select Start > Programs > Securify Studio N.N.N > Studio vn.n.n (where N.N.N is the version number). Studio appears as shown in Figure 2-1. Figure 2-1: Securify Studio, initial view For information about configuring and using Studio, see the Securify Studio User Guide. 14 Installing Securify Studio

15 CHAPTER 3 Installing and Upgrading a Securify Distributed Login Collector This chapter provides instructions for installing a Securify Distributed Login Collector (DLC). Note: Upgrade the DLC last. Everything that communicates with a DLC should be upgraded to the latest version first, and then the DLC itself should be upgraded to the latest version. The DLC gathers login events from Domain Controllers (DCs) so that monitored network traffic can be associated with user identities. System Requirements on page 16 Installing DLC Software on page 17 Configuring the DLC on page 18 Using NTLMv2 with DLCs on page 26 The default authentication method in Windows environments, LM hash, generates a weak response that can be used by an attacker to perfrom an off-line, brute-force attack in order to guess the actual password. Read this section to learn how to use the NTLMv2 authentication method for a more secure connection between a DLC and a DC. Installing and Upgrading a Securify Distributed Login Collector 15

16 Securify System Requirements The DLC software runs as a Microsoft Windows service on a Windows server, and requires a system that meets these minimum requirements: Intel Pentium III processor running at 500 Mhz or better 1 GB RAM 10 GB hard drive free space Display set to 1024x768 pixels or greater Microsoft Windows 2003 Server Service Pack 1 Network connectivity to the Securify system (the Enterprise Manager, or the Monitor in the case of a stand-alone Monitor deployment) Network connectivity to the DCs of the Microsoft Active Directory domain that the Securify system s policy is expecting to monitor. Important: Ensure that you have a certificate for the DLC, whether it is a newly generated (by the DLC) self-signed certificate or one generated by a Certifcate Authority. The DLC will not function without a certificate. DNS Resolution Requirements Proper DNS resolution is a very critical prerequisite for Identity Collection. Both the machine hosting the DLC and the Securify Enterprise Manager or Monitor configured to collect identities must be configured to refer to a DNS server that: must be able to resolve any domains from which logins are collected This can be accomplished using DNS forwarding in Microsoft Windows 2003 must provide forward resolution for all hosts that belong to any domains from which logins are collected must provide reverse resolution for all Domain Controllers from which logins are collected must be able to access SRV records for all of the Domain Controllers from which logins are collected 16 Installing and Upgrading a Securify Distributed Login Collector

17 Installation Guide Installing DLC Software The DLC software is shipped on the Studio CD. You do not need a special passphrase to install the DLC. If you have purchased a licence for a Securify Enterprise Manager or for a Securify Monitor, you may install as many instances of the DLC as are needed to provide adequate coverage for the Domain Controllers in your monitored domain. Note: The DLC service may be incompatible with other Windows applications and processes. Use caution when deploying a DLC on a machine where it must share resources with other heavily utilized services. To install the DLC software: 1 Uninstall the previous version of DLC if you have one. Use the Add or Remove Programs tool in Control Panel to uninstall the Securify Distributed Login Collector. 2 Ensure that you have also already upgraded all other components that communicate with the DLC (such as the Enterprise Manager). 3 Insert the Studio CD. Using Windows Explorer, display the contents of the Studio CD. 4 Copy the DLC installer (for example DLC_V601_91.exe) from the Studio CD to the target machine. 5 Ensure you are logged in as an administrator and double-click the local copy of the installation file. Follow the prompts to install: a Accept the license agreement. b Accept the default installation location or select a new one. c Accept the default program group or select a new one. d Allow the installation to start. e Click Config to display the DLC Configuration dialog. For more information, see Configuring the DLC on page 18. Note: At the end of the installation, you see the configuration screen. Configuration can take place at this point, or you can click through and configure the DLC later using: C:\Program Files\Securify\DLC\WMICONFIG.EXE. 6 Reboot the server and ensure the DLC service is started after the reboot. Installing DLC Software 17

18 Securify Configuring the DLC The DLC runs as a Windows service, and starts automatically after every power cycle. To configure the DLC: All configuration is done from an application named Securify DLC on the local Windows server. Go to the Start menu, and select Start > Programs > Securify DLC > DLC Configuration to display the DLC Configuration dialog (Figure 3-1). Figure 3-1: DLC Configuration dialog Configuration tab. Note: You do not have to restart the DLC service when you make configuration changes. Changes take effect after you click OK. The DLC s configuration information is stored in the Windows Registry. 18 Installing and Upgrading a Securify Distributed Login Collector

19 Server Certificate Installation Guide The Server Certificate settings are used to configure the certificate that the DLC uses to authenticate itself to the Enterprise Manager. Important: Ensure that you have a certificate for the DLC, whether it is a newly generated (by the DLC) self-signed certificate or one generated by a Certifcate Authority. The DLC will not function without a certificate. To reconnect a DLC to an Enterprise Manager after a new certificate has been generated, go to Manage > Domains for the Enterprise Manager, select the DLC to reconnect, and then select Submit Changes. Distinguished Name The Distinguished Name contains the Common Name and other attributes that the DLC needs to identify the certificate found in its store (see Store Name below) that should be used to authenticate to the server. For example, cn=dlc.centserv.org, o=centserv, c=us could be the Distinguished Name, comprised of the certificate s Common Name (cn), organization name (o) and country of origin (c). To use a self-signed certificate, you only need to use the Common Name (prefixed with cn=) for identification. Store Name The Store Name, or Certificate Store name, is where the DLC looks to find its certificates. The default setting for the Store Name is SecurifyDLC\MY. This uses the Store Type CERT_SYSTEM_STORE_SERVICES. If the DLC is running in standalone mode, use the Store Name MY. This uses the Store Type CERT_SYSTEM_STORE_CURRENT_USER. Generate Self-Signed Certificate Only available when the Distinguished Name field is not blank, the Generate Self-Signed Certificate button generates a self-signed certificate and places it in the certificate store identified by Store Name. View Certificate Only available when the Distinguished Name field is not blank, the View Certificate button displays a Windows-standard certificate viewer displaying the certificate matching the Distinguished Name, if one is found in the store. Configuring the DLC 19

20 Securify SecurVantage Connection The SecurVantage Connection settings are used to configure the connection between the Enterprise Manager or Monitor and the DLC. Server Port This option specifies the port for the DLC service to listen on. As long as another service is not listening on the specified port, use your choice of port. The default is port 443. Valid port numbers are Certificate Checking This option specifies the check type to perform. There are three types: Certificate Hash A Certificate Hash check is checking that the hash configured for the given common name matches the hash stored. Certificate Store The Certificate Store check is where the certificate must be signed by a certificate authority found in the Certificate Store. Certified Not Required Certificate Not Required does not check any certificate and is not deemed secure. Securify recommends using Certificate Hash as the most secure method. Type The Types of Certificate available are encrypted using TLS or not encrypted. The encrypted certificate type encrypts between the DLC and the Monitor or Enterprise Manager. Non-encrypted sessions are not recommended. Log The Log settings are used to configure the logging options of the DLC. Debug Level This option controls the amount of information written out to the log during operation. The level of detail increases with the debug level; the default is 0, with no extra log detail recorded. File Location This option determines where in the system the log files are kept. Default is C:\Program Files\Securify. File Size This option controls the size, in Kilobytes, to which the log file grows before rotating. The system keeps up to 5 log files in the selected file location; dlc.log is the most recent file, followed chronologically by dlc.log.1 to dlc.log Installing and Upgrading a Securify Distributed Login Collector

21 DC Connection Installation Guide The DC Connection settings are used to configure the connection to the DC. Authentication Type This option specifies the type of authentication for the connection between the DLC and any DCs. Kerberos and NTML authentication are supported. Default is Kerberos. Important: With the Kerberos authentication type, all machines using the same target must synchronize their time setting. CPU Disconnect Threshold This option determines when the DLC introduces rate-limiting if services on a monitored DC consume too much CPU too quickly. If the CPU threshold is crossed, the DLC stops polling a domain for twenty minutes. After the twenty minute window, giving the CPU time to handle its load, the DLC reconnects. If you find that the DLC is frequently resorting to rate-limiting, you should try disabling the Allow Backlog Queries feature. Allow Backlog Queries This option determines whether the DLC checks the security event logs for identity-related events that may have occurred while it was disconnected, instead of simply picking up where it had left off. Important: Backlog queries are likely to affect the performance of heavily loaded machines and legacy hardware (such as Windows based DCs) and are not recommended. If you find that the DLC is frequently resorting to rate-limiting, try disabling this feature. Configuring the DLC 21

22 Securify DLC Remote Configuration The Remote tab contains the certificate common name and certificate hash of any Enterprise Manager (or Monitor) that connects to this DLC. Note: The DLC accepts any number of Certificates in the Remote tab. Figure 3-2: DLC Configuration dialog Remote tab. To create a new connection: 1 Click New. 2 Type the common name of the certificate into the Common Name field and paste its corresponding hash into the Certificate Hash field. 3 Click OK to commit the information, or click Cancel to quit without saving. Note: Changes are also committed if you click the Configuration tab. 22 Installing and Upgrading a Securify Distributed Login Collector

23 Installation Guide Using Microsoft Management Console for Certificate Management DLC uses the Microsoft Certificate store for the management of keys. After installing the DLC the easiest way to view the certificates is to use the Microsoft Management Console (MMC) to view the Certificate store for the DLC service. To use MMC: 1 Launch MMC (Start > Run > MMC). The MMC Console is displayed. 2 Navigate to File > Add/Remove Snap-in to display the Add/Remove Snapin dialog. Configuring the DLC 23

24 Securify 3 Click Add to display the Add Standalone Snap-in dialog. 4 Select Certificates and then click Add to display the Certificates snap-in dialog. 5 Select Service account on the Certificates snap-in dialog, and then click Next. 6 Select Local computer, and then click Next. 7 Select Securify Distributed Login Collector from the list of services and then click Finish. 8 Click Close on the Add Standalone Snap-in dialog. 9 Click OK on the Add/Remove Snap-in dialog to close the dialog. MMC displays the certificate information for the DLC. 24 Installing and Upgrading a Securify Distributed Login Collector

25 Installation Guide 10 Right-click a certificate or a store to import certificate lists in the display. Importing/Removing a Server or Client CA Certificate for DLC See the Microsoft documentation on the Certificate snap-in for MMC on importing a certificate as a CA for DLC. Configuring the DLC 25

26 Securify Using NTLMv2 with DLCs Securify recommends that you use the NTLMv2 authentication method on Windows 2003 servers where you are running a DLC. This enables the DLC to use NTLMv2 to authenticate to the DCs. This can only be accomplished by modifying the Registry; no changes are required on the DCs. Warning: This procedure requires modifying the Windows 2003 Server Registry. This could leave your system completely unusable or in an unstable state. Make a backup of your Registry before proceeding. 1 If the Windows 2003 Server offers other services and there are clients that do not support NTLMv2 (for example, WINDOWS 95 or Windows 98), this change prevents these old clients from using the server. To force the use of NTLMv2: 1 Logon to the Windows 2003 server where the DLC runs. Note: You must have administrator privileges to change the Windows 2003 server Registry. 2 Launch the registry editor (Start -> Run -> regedit). 3 Navigate to the key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA 4 Right-click the value LmCompatibilityLevel. See: reskit/regentry/76052.mspx?mfr=true 5 Click Modify. 6 Type the number 5 (only use NTLMv2 authentication and negotiate NTLMv2 session security if the server supports it) and click OK. 7 Restart the Windows 2003 server. 8 Ensure the IA status on the Securify server is OK after 10 minutes. 1 For more information, see: 26 Installing and Upgrading a Securify Distributed Login Collector

27 CHAPTER 4 Installing Securify Monitors, Enterprise Managers, or Enterprise Global This chapter provides installation instructions, including hardware setup, for version 6.0 of the following Securify appliances: Monitor product family (Monitor, Monitor LE, Monitor SE, Flow Monitor, Flow Monitor SE) Enterprise Manager and Enterprise Manager SE Enterprise Global System Requirements on page 28 Overview of Installation on page 28 Configuring an Appliance on a Network on page 30 Wiring an Appliance on page 31 Installing the Core Appliance Software on page 32 What s Next? on page 38 Installing Securify Monitors, Enterprise Managers, or Enterprise Global 27

28 Securify System Requirements The Securify Web interface you use to manage and configure the Securify appliances requires a system that meets these minimum hardware and software requirements: Processor running at 1GHz or better 1GB RAM (or more, to improve performance) 2 GB is required to use Group Behavior Profiling (GBP) Display set to 1024x768 pixels or greater Microsoft Windows 2000 or Windows XP Internet Explorer 7 (you should also be able to use Firefox 3 without issues) Overview of Installation The installation is identical for all appliances in the Monitor, Enterprise Manager and Enterprise Global product lines. The only difference is in the display of the name of the actual product within the screens during the software installation. Note: The configuration and installation instructions in this guide are only applicable to version 6.0 of the Securify products. For configuration and installation instructions for the and earlier versions of the Securify products, see the appropriate version of the Securify Installation Guide. Consult your Securify representative about installing the version 6.0 software onto an older appliance that shipped with an earlier version of the software. Following is a frontal view of an appliance with the bezel included: Note: The name of the actual product shown on the bottom-right corner of the appliance bezel varies depending on the product. 28 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

29 Installation Guide Appliance Packaging Each member of the Monitor, Enterprise Manager, and Enterprise Global product lines consists of a single appliance and comes with the following: 1U server mounting rails DB9/RJ45 console cable (Monitor and Enterprise Manager products) Crossover cable (Enterprise Global) Power cord You may need some or all of the following: ethernet cable monitor hubs PS/2 or USB Keyboard mouse Overview of Installation 29

30 Securify Configuring an Appliance on a Network All Appliances Monitor Product Line Ensure you follow the requirements for the appliance you are installing. Obtain a status IP address with net mask and gateway parameters Obtain information on an SNMP (Simple Network Management Protocol) server so that Securify is able to generate SNMP traps Obtain information on an NTP (Network Time Protocol) server connection to automatically synchronize network activity time (otherwise you must synchronize the time for Securify components manually) Obtain information on an SMTP (Simple Mail Transfer Protocol) server connection for sending notification messages for critical violations or system alerts Obtain information on a DNS (Domain Name System) server connection for DNS name resolution in the Web Application In addition to the items listed under All Appliances: Identify a physical location where the Monitor appliance(s) can be rackmounted near a switch with a SPAN port Note: The switch must have a SPAN (Switch Port Analyzer) port enabled. SPAN is a feature on the switch that enables port mirroring of traffic on that switch. If SPAN is not currently enabled, contact your switch vendor for SPAN configuration instructions. Obtain information on a DNS (Domain Name System) server connection for DNS name resolution in the Web Application Flow Monitor and Flow Monitor SE In addition to the items listed under All Appliances: Obtain a static IP address with net mask and gateway for Flow data collection 30 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

31 Installation Guide Wiring an Appliance Each Monitor appliance has two network interfaces: Ethernet 1 (Eth 1 on the left) Ethernet 2 (Eth 2 on the right) As part of the configuration for the appliance, you assign an IP address and other related network attributes to the Eth 1 port. For Flow Monitors, you also configure attributes on the Eth 2 port. Note: Rack the appliance before connecting it to a network. A Monitor appliance should be rack-mounted near a switch of a SPAN port. To wire an appliance: 1 Use a standard category 5 cable to connect its Eth 1 port to the network. For Enterprise Manager and Enterprise Global appliances, the same port is used for both administrative access and connectivity. 2 (Monitor line) Use a standard category 5 cable to connect the Eth 2 port to the SPAN port it is monitoring or, on a Flow Monitor or Flow Monitor SE, to the network port from which Flow traffic is received. Figure 4-1: Monitor appliance Eth 1 Eth 2 Network Category 5 cable Collection point SPAN port or Flow collection point Figure 4-2: Enterprise Manager or Enterprise Global appliance Eth 1 Eth 2 Network, for admin access Category 5 cable Wiring an Appliance 31

32 Securify Installing the Core Appliance Software Warning: Installing the core appliance software erases the contents of all hard drives when you insert the CD and reboot the appliance. To install the core appliance software: Note: Steps 1 through 6 initialize the installation and are typically performed for you by Securify before your appliance is shipped. You will normally start at the configuration phase, step 7, when you receive your appliance. 1 Connect the power cord, monitor, and keyboard either USB or PS/2 to the appliance. 2 Press the power button located on the front of the appliance to start it. 3 Go into BIOS, then set the time for the appliance to UTC time. For current UTC time, refer to: 4 Open the CD drive, insert the appropriate CD, then reboot the appliance. The installer reports: Welcome to the Securify(TM)Installer 0 This program will install Securify Monitor. 0 Only approved hardware configurations are supported. Please verify your configuration before continuing. 0 Continuing will cause ALL hard disks on this computer to be erased and overwritten. Please verify the disks you are using contain no important data. 0 To begin the installation, press the <ENTER> key. < > boot: 5 Press Enter to begin the installation. You see messages as the installation progresses. When the initial phase is completed, you see a screen showing the product name and version number. Next, you see messages as packages are installed. This can take several minutes. 32 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

33 Installation Guide 6 Remove the CD when it is ejected at the end of installation and close the drive on all appliances except for Enterprise Global. Once the system reboots, the installer reports information about building the embedded database and provides an estimation for how long it will take. The appliance may reboot a second time before beginning to build the embedded database. After the database is built, the installer reboots the appliance again. Once the appliance reboots, the installer displays: The Securify product has been fully installed. [System information appears here.] The system may be safely rebooted (and then halted) or the system specific information can be entered to finish customizing the system for use. Either press <ctl><alt><del> to exit OR <CR> to continue The name of the actual product you are installing displays in the installer message above. Note: On new appliances, steps 1 through 6, the initialization phase, should be completed. 7 Press Enter to continue with the configuration phase of the installation. 8 Press Enter to read the license agreement when prompted. To navigate through the agreement, press the space bar to move to the next page, press b to move back to the previous page, press h for more help, or press q to quit reading and move to the next step. 9 After pressing q (to quit reading), type yes, and then press Enter if you agree to the terms of the agreement. 10 Type the network information requested when you are prompted. Press Enter after each item. Use the mouse, tab key, or arrow keys to move from one field to another. Type over the displayed value, such as the IP address, to change it. Installing the Core Appliance Software 33

34 Securify Use the mouse, or press the space bar to toggle on and off a property with a check box (for example, SSH password authentication). For this field... Machine Name MTU Size SSH enabled in IPTABLES SSH password authentication Configure IPv4 Configure IPv6 Configure IPv6 via STAAC Add second NIC for Flow Data Type... The name of the appliance (sys1, for example). The MTU rate for eth1 (Monitor) or eth1 (Enterprise Manager and Enterprise Global) the administrative interface that has an externally addressable IP address. The default is the appropriate setting for most situations. If the appliance you are defining requires a different value, type that value. For example, for a PPPoE connection, you would set the MTU size to Check this box to enable SSH on the appliance. Check this box to enable SSH authentication. If you select this option, you must also select SSH enabled in IPTABLES. Check this box to enable IPv4 for the appliance. Check this box to enable IPv6 for the appliance. Check this box to enable IPv6 by way of Stateless Auto Address Configuration (STAAC) for the appliance. Selecting this option will autoconfigure all IPv6 settings by way of negotiation with the router. Check with your site network administrator before enabling this option due to security concerns. (Flow Monitor and Flow Monitor SE only) Check this box to enable a second network interface card (NIC) for Flow collection. 11 Select <Next--> to proceed to specifying network address information. Note: You can change the IP address for the appliance at any time by running editsvnetwork.pl directly as root from the console or remotely after connecting to the appliance by way of SSH. You need to have /opt/ svs/system/bin in your path, or change to that directory to run the command. 34 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

35 Installation Guide 12 (IPv4 selected) Type the IPv4 network information requested when you are prompted. Press Enter after each item and then select Next to proceed when you are done. Note: If you select IPv4 exclusively, you will still see a link local IPv6 address when you use ifconfig. This is normal behavior. The system knows the address is not routable and neither sends nor receives IPv6 data. Use the mouse, tab key, or arrow keys to move from one field to another. Type over the displayed value, such as the IP address, to change it. For this field... System IP Address Netmask Gateway IP Address Type... The IPv4 address of the appliance s command port. Specify the address using the format a.b.c.d. The command port is the ethernet port used to access the appliance s Web interface. The IPv4 netmask of the appliance. Specify the netmask using the format a.b.c.d. The IPv4 address of the network gateway, typically a router, that is responsible for the network that includes the address specified in System IP Address. Specify the address using the format a.b.c.d. 13 (IPv6 selected) Type the IPv6 network information requested when you are prompted. Press Enter after each item and then select Next to proceed when you are done.. Use the mouse, tab key, or arrow keys to move from one field to another. Type over the displayed value, such as the IP address, to change it. For this field... System IP Address Gateway IP Address Netmask Type... The IPv6 address of the appliance s command port. The command port is the ethernet port used to access the appliance s Web interface. The IPv6 address of the network gateway, typically a router, that is responsible for the network that includes the address specified in System IP Address. The IPv6 netmask of the appliance. Installing the Core Appliance Software 35

36 Securify 14 Select < SAVE > to save the information when you finish. Next, the installer displays a box requesting information about the appliance s serial port. 15 Use the mouse, or press the space bar to toggle on or off serial port login to the appliance. See Optionally Enable a Serial Port Connection on page 37 for information about performing this step outside of the installation process. When serial port login is enabled, you can connect a tty to the serial port of the appliance to connect to the appliance command line interface. Only the svs account can log on by way of the serial tty. When serial port login is off, this feature is disabled. The recommended setting is disabled, which is the default. Next, the installer automatically creates a certificate for the appliance and compiles the default policy. 16 Type the user name and password (with confirmation) for the Web administrator account for accessing the appliance. Press Enter after each item. At this prompt... Enter a user name: Enter a password for <username>: Confirm <user name s> password: Type... The user name assigned to the Web interface administrator account. A user must sign in as this user to configure the appliance software. The user name must be at least 6 characters, and can contain upper and lowercase letters, numbers, and - or _ characters. The password for the administrator account. The password must be at least 8 characters, and it must contain at least one uppercase letter, one lowercase letter, and one number. Retype the password for the administrator account. Tip: Securify recommends that you use a password for the administrator account that is at least 8 characters and contains at least one uppercase letter, one lowercase letter, and one number. The installer reports that the user name was added successfully and then prompts for a password. 36 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

37 Installation Guide 17 Type a password for the root account, press Enter, then type the password again and press Enter again to confirm. Tip: Securify recommends that you use a password as strong as for the Web interface: at least 8 characters, and containing at least one uppercase letter, one lowercase letter, and one number. The installer reports that you successfully set the root password, then prompts you to type a password for the svs account. 18 Type a password for the svs account, press Enter, then type the password again to confirm. Tip: Securify recommends that you use a password for the svs account that is at least 8 characters, and contains at least one uppercase letter, one lowercase letter, and one number. The installer displays a screen that summarizes your supplied information. 19 Copy the information and save it in a safe place. After you copy the network information, press Enter to reboot the appliance. Optionally Enable a Serial Port Connection You can perform this operation at any time if you do not do it during installation (see step 15). 1 Log in to the appliance as root. 2 Type editsvmisc.pl to display the Securify Misc System Setup dialog. 3 Select the box to enable a serial port connection for the particular Securify appliance. 4 Reboot the appliance. 5 Connect to the Securify appliance s COM1 port with a db9 null modem cable. 6 Set the terminal settings to 8-N-1 at 9600 baud with a vt100 setting. Installing the Core Appliance Software 37

38 Securify What s Next? For instructions on upgrading software, see Upgrading Securify Software on page 59. For information about configuring SSH access after installation, see Allowing SSH Access on page 57. For information about generating and installing certificates, see Managing Certificates on page 63. Warning: Before a planned service outage, Securify appliances should be safely powered down to avoid unexpected behavior when power is restored. Use the command svhalt to halt the system before pressing the power button. 38 Installing Securify Monitors, Enterprise Managers, or Enterprise Global

39 CHAPTER 5 Installing Securify Enterprise Reporting This chapter provides the hardware configuration, and software and hardware installation instructions for the Securify Enterprise Reporting (ER) system. About the Enterprise Reporting Hardware on page 40 Configuring Enterprise Reporting on a Network on page 41 Wiring an ER Gateway and ER Warehouse on page 42 Installing Enterprise Reporting Software on page 43 Configuring the Crystal Enterprise Software on page 50 Formatting the Third Hard Drive on page 54 What s Next? on page 55 Installing Securify Enterprise Reporting 39

40 Securify About the Enterprise Reporting Hardware An Enterprise Reporting system consists of two appliances one for the ER Gateway and another for the ER Warehouse. Each appliance has its own IP address. Note: The configuration and installation instructions in this guide are only applicable to version 6.0 of the Securify products. For configuration and installation instructions for the and earlier versions of the Securify products, see the appropriate version of the Securify Installation Guide. Following is a frontal view of the ER appliances with the bezels included: Note: Consult your Securify representative about installing the Enterprise Reporting version 6.0 software onto an older Enterprise Reporting appliance that shipped with an earlier version of the software. Miscellaneous other hardware Each appliance comes with the following: 1U server mounting rails DB9/RJ45 console cable Crossover cable Power cord You may need some or all of the following: ethernet cable monitor hubs PS/2 or USB Keyboard mouse 40 Installing Securify Enterprise Reporting

41 Configuring Enterprise Reporting on a Network Installation Guide Before installing an Enterprise Reporting appliance, obtain a static IP address with net mask and gateway parameters. Note: If you are deploying Enterprise Reporting in an IPv6 environment, you must assign the ER Warehouse both an IPv4 and an IPv6 address during installation. After you install an Enterprise Reporting appliance, you may also need the following: An SNMP (Simple Network Management Protocol) server for critical violation and system alert traps. This server enables Securify to generate SNMP traps. A DNS (Domain Name System) server connection for DNS name resolution. This server enables Securify to provide DNS name resolution in the Web interface. An NTP (Network Time Protocol) server connection to synchronize network activity time. You must synchronize the time for Securify components manually without an NTP server. An SMTP (Simple Mail Transfer Protocol) server connection notification messages. This server enables Securify to send notifications of critical violations or system alerts. Configuring Enterprise Reporting on a Network 41

42 Securify Wiring an ER Gateway and ER Warehouse Each ER Gateway and ER Warehouse appliance has two network interfaces: Ethernet 1 (Eth 1 on the left) Ethernet 2 (Eth2 on the right) As part of configuration, you assign an IP address and other related network attributes to each appliance s Eth 1 port. To wire an ER Gateway and ER Warehouse: 1 Connect the ER Warehouse appliance to the ER Gateway appliance using a crossover cable between the eth 2 (Ethernet 2) ports on each appliance. Eth 1 Eth 2 ER Gateway Network, for admin access Network, for admin access Crossover cable ER Warehouse 2 Use a standard category 5 cable to connect Eth 1 on each appliance to a network. This interface is used for administrative access and Enterprise Manager connectivity. 42 Installing Securify Enterprise Reporting

43 Installation Guide Installing Enterprise Reporting Software Installing software for an Enterprise Reporting system consists of: Installing the ER Gateway software from its own CD Installing the ER Warehouse software from its own CD Installing the Crystal Enterprise software from its own CD Once you have installed the Crystal Enterprise software, you must complete certain configuration tasks before you can utilize your Enterprise Reporting system. These tasks are described in Configuring the Crystal Enterprise Software on page 50. Important: If you are re-installing ER Gateway or ER Warehouse software, you must remove the third hard drive (the drive at the far right when you face the appliance) before continuing with reinstalling the software. If you do not remove the third hard drive first, all backup data is erased. A re-installation means you are installing the same version of the software to an appliance to which you had already installed software. Always perform a backup, including of reports in the case of ER Warehouse, before you begin re-installing software. For more information on back ups and upgrading, see the chapter on Managing Your Enterprise Reporting System in the Securify Enterprise Reporting Operations Guide. If you are re-installing, for example because of an ER Gateway failure, contact Securify technical support for assistance in getting your ER Gateway and ER Warehouse re-connected and any relevant data restored. In the case of updates and upgrades, review the Release Notes that accompany the update for important information such as an estimate of how long the update process may take, dependencies for the update and in what sequence you should perform the tasks necessary for an update. Installing Enterprise Reporting Software 43

44 Securify To install ER Gateway or ER Warehouse software: Note: Steps 1 through 6 constitute the initialization phase of installation and are typically performed for you by Securify before your appliance is shipped. You will normally start at the configuration phase, step 7, when you receive your appliance. 1 Connect the power cord, monitor, and keyboard either USB or PS/2 to the appliance. 2 Remove the third hard drive, if necessary. a Push the release button beside the third hard drive (the one on the right). b Pull the handle gently to remove it. Fold the handle back into place to avoid accidentally damaging it. For information on formatting this drive after installation, see Formatting the Third Hard Drive on page Press the power button located on the front of the appliance to start it. 4 Go into BIOS, then set the time for the appliance to UTC time. For current UTC time, see 5 Open the CD drive, insert the Enterprise Reporting CD (ER Gateway or ER Warehouse), then reboot the appliance. The installer reports: Welcome to the Securify(TM)Installer This program will prepare monitoring stations for use with Securify. Only approved hardware configurations are supported. Please verify your configuration before continuing. Continuing will cause ALL hard disks on this computer to be erased and overwritten. Please verify the disks you are using contain no important data. To begin the installation, press the <ENTER> key. < > boot: Note: When you receive your appliance, steps 1 through 5, the initialization phase, have typically already been completed. 6 Press Enter to continue with the configuration phase of the installation. You see messages as the installation progresses. 44 Installing Securify Enterprise Reporting

45 Installation Guide 7 Remove the CD when it is ejected at the end of installation and close the drive. Once the appliance reboots, the installer reports: Building embedded database: This will take approximately 25 minutes. The screen may not show any output during this time frame. This is normal as the system is working in the background. After the database is installed, the installer reboots the appliance. Once the appliance reboots, the installer displays a message similar to the following, depending on whether you are installing software for the ER Gateway or the ER Warehouse: The Securify ER Gateway has been fully installed. [System information appears here.] The system may be safely rebooted (and then halted) or the system specific information can be entered to finish customizing the system for use. Either press <ctl><alt><del> to exit OR <CR> to continue Note: When you receive your appliance, steps 1 through 6, the initialization phase, have typically already been completed. 8 Press Enter to continue with the configuration phase of the installation. 9 Press Enter to read the license agreement when prompted. To navigate through the agreement, press the space bar to move to the next page, press b to move back to the previous page, press h for more help, or press q to quit reading, and move to the next step. 10 Press q (to quit reading), type yes, and then press Enter if you agree to the terms of the agreement. 11 Type the network information requested when you are prompted. Press Enter after each item. Use the mouse, tab key, or arrow keys to move from one field to another. Type over the displayed value, such as the IP address, to change it. Installing Enterprise Reporting Software 45

46 Securify Use the mouse, or press the space bar to toggle on and off a property with a check box. For this network information... System IP Address Netmask Gateway IP Address Machine Name MTU Size SSH enabled in IPTABLES SSH password authentication Type... The IP address of the Enterprise Reporting appliance s command port. Specify the address using the format a.b.c.d. The command port is the ethernet port used to access the appliance s Web user interface. The netmask of the Enterprise Reporting appliance. The IP address of the network gateway, typically a router, that is responsible for the network that includes the address specified in System IP Address. Specify the address using the format a.b.c.d. The name of the Enterprise Reporting appliance (sys1, for example). The MTU size for eth0 the administrative interface that has an externally addressable IP address. The default is the appropriate setting for most situations. If the appliance you are defining requires a different value, type that value. For example, for a PPPoE connection, you would set the MTU size to Check this box to enable SSH on the Enterprise Reporting appliance. Check this box to enable SSH authentication. If you select this option, you must also select SSH enabled in IPTABLES. 12 Select <SAVE> to save the information when you finish. 13 Use the mouse, or press the space bar to toggle on and off serial port login to the Enterprise Reporting appliance. When serial port login is on, you can connect a tty to the serial port of the appliance to connect to the Enterprise Reporting command line. Only the svs account can log on by way of the serial tty. When serial port login is off, this feature is disabled. The recommended setting is the default, disabled. Unless you need this option, accept the default setting of disabled. 46 Installing Securify Enterprise Reporting

47 Installation Guide Next, the installer creates a certificate for the appliance and compiles the default policy. 14 ER Gateway only: Type a user name and password for the Web administrator account for accessing the appliance. Press Enter after each item. At this prompt... Enter a user name: Enter a password for <username>: Confirm <user name s> password: Type... The user name assigned to the Web interface administrator account. A user must sign in as this user to configure the Enterprise Reporting software. The user name must be at least 6 characters, and can contain upper and lowercase letters, numbers, and - or _ characters. The password for the administrator account. The password must be at least 8 characters, and it must contain at least one uppercase letter, one lowercase letter, and one number. Retype the password for the Web administrator account. Tip: Securify recommends that you use a password for the administrator account that is at least 8 characters and contains at least one uppercase letter, one lowercase letter, and one number. Note: The next step (Time Zone Offset) is only for the ER Warehouse. 15 ER Warehouse only: At the Time Zone Offset prompt, type a number that corresponds to your time zone. The installer displays a table of time zone offsets and codes. For example, [5] PST -8 indicates that Pacific Standard Time (code 5) is 8 hours earlier than UTC. Enterprise Reporting uses the time zone offset you select to determine the time period for daily reports. Note: The remaining steps are for both ER Gateway and ER Warehouse. 16 Type a password for the root account when prompted, press Enter, then type the password again to confirm. Installing Enterprise Reporting Software 47

48 Securify Tip: Securify recommends that you use a password for the root account that is at least 8 characters, and contains at least one uppercase letter, one lowercase letter, and one number. The installer reports that you successfully set the root password, then prompts you to type a password for the svs account. 17 Type a password for the svs account, press Enter, then type the password again to confirm. Tip: Securify recommends that you use a password for the svs account that is at least 8 characters, and contains at least one uppercase letter, one lowercase letter, and one number. The installer displays a screen that summarizes your supplied information. 18 Copy the information and save it in a safe place. After you copy the network information, press Enter to restart the appliance. Note: If you removed the third hard drive earlier in the installation, power the appliance off before it finishes rebooting, re-insert the third hard drive, then restart the appliance. As the appliance reboots, watch to see that all three hard drives are initialized. 19 Optionally enable a serial port connection. Note: You can perform this operation at any time if you do not want to do it during installation. a Log in to the appliance as root. b Type editsvmisc.pl to display the Securify Misc System Setup dialog. c Select the box to enable a serial port connection for the particular Securify appliance. d Reboot the appliance. e Connect to the Securify appliance s COM1 port with a db9 null modem cable. f Set the terminal settings to 8-N-1 at 9600 baud with a vt100 setting. 20 Proceed depending on what you have already done: If you have only installed the ER Gateway software, return to step 5 on page 44 to install the ER Warehouse software If you are installing the ER Warehouse software, proceed to the instructions for installing the Crystal Enterprise software (To install the Crystal Enterprise software on the ER Warehouse appliance: on page 49) 48 Installing Securify Enterprise Reporting

49 Installation Guide If you have finished installing the Enterprise Reporting software, proceed to Configuring the Crystal Enterprise Software on page 50. Note: After you have completed installing and configuring the software, remember that you may need to format the third hard drive. For information, see Formatting the Third Hard Drive on page 54. To install the Crystal Enterprise software on the ER Warehouse appliance: 1 Open the CD drive and insert the Crystal Enterprise CD. Note: Ensure that all three hard drives on the ER Warehouse appliance have been initialized before you insert the Crystal Enterprise CD. 2 Log in as root with the Crystal Enterprise CD loaded. 3 Type the following command at the system prompt: # crystalinstall.pl --install This installs the Crystal Enterprise reporting system software. Once the installation reports that it has completed, you may remove the CD from the drive. This concludes the ER Warehouse installation. 4 Proceed to Configuring the Crystal Enterprise Software on page 50. Note: If you are deploying Enterprise Reporting in an IPv6 environment, you must assign the ER Warehouse both an IPv4 and an IPv6 address during installation so that the Crystal Enterprise software will function properly. Installing Enterprise Reporting Software 49

50 Securify Configuring the Crystal Enterprise Software This section describes the configuration tasks you must complete following the installation of the Crystal Enterprise software. Enabling the Crystal Enterprise License Key on page 50 Enabling the Crystal Enterprise Servers on page 52 Enabling Auditing on page 52 Configuring Report Retention on page 53 Enabling the Crystal Enterprise License Key ER Warehouse is not installed with a Crystal Enterprise license key. Your production version of Enterprise Reporting uses a multi-user license key that permits users to log on to the ER Warehouse and run reports concurrently. Note: If you log on to ER Warehouse, then quit without logging off, ER Warehouse may still consider you logged on. Remember to log off at the end of each ER Warehouse session. To enable the ER Warehouse license key: 1 Connect to the ER Warehouse with your Web browser, using this URL: IP address>/crystal/enterprise10/admin where <warehouse IP address> is the IP address of the ER Warehouse appliance. The logon screen for the Crystal Enterprise report engine displays. 2 Type the user name (administrator), and password. By default, there is no user password set in the Crystal Enterprise software. 3 Click the Log On button to display the home page. 50 Installing Securify Enterprise Reporting

51 Installation Guide 4 Select License Keys. 5 Type your multi-user license key in the Add Key field and then click Add. 6 Proceed to Enabling the Crystal Enterprise Servers. Configuring the Crystal Enterprise Software 51

52 Securify Enabling the Crystal Enterprise Servers Once you enable the license key, you must enable the Crystal Enterprise servers. 1 Follow steps 1 through 3 for Enabling the Crystal Enterprise License Keyto log onto the ER Warehouse and view the Crystal Enterprise home page. 2 Select Servers from the home page to display the Servers configuration page. Enabling Auditing 3 Check the box in the Selected column for each server that is disabled, then select the enable button at the top of the panel to enable the selected servers. 4 Proceed to Enabling Auditing. With your license key and the Crystal Enterprise servers enabled, you must enable auditing. When auditing is enabled, you can track the operation of the system. For instructions about enabling auditing, see the help on Enabling auditing of user and system actions in the Crystal Enterprise Administrator s Guide. Proceed to Configuring Report Retention on page Installing Securify Enterprise Reporting

53 Configuring Report Retention The default settings for retaining reports are: Installation Guide Last 100 report instances This count is regardless of the type of report. If you run 101 instances of the same report, only 100 are retained. Seven (7) days If these settings are not sufficient, adjust them as necessary. To adjust report retention settings: 1 Connect to the ER Warehouse with your Web browser, using this URL: IP address>/crystal/enterprise10/admin where <warehouse IP address> is the IP address of the ER Warehouse appliance. The logon screen for the Crystal Enterprise report engine displays. 2 Type the user name (administrator), and password on the log on screen. By default, there is no user password set in the Crystal Enterprise software. 3 Click the Log On button to display the home page. 4 Click Settings. 5 Click the Limits tab. 6 Adjust the settings for the following to suit your needs: Delete excess instances for the following users/groups Delete instances after N days for the following users/groups 7 Proceed to Formatting the Third Hard Drive on page 54. Configuring the Crystal Enterprise Software 53

54 Securify Formatting the Third Hard Drive You must format the third hard drive when you install Enterprise Reporting for the first time. If you fail to remove the third hard drive when you install Enterprise Reporting software, the third drive may become unreadable. If this occurs, you can reformat the third hard drive so that it can be used to back up Enterprise Reporting data. To format the third hard drive: 1 Log on as root. From the console, type: cd /opt/svs/system/bin/, then press Enter. 2 Type:./.format_sdc.sh, then press Enter. 3 Confirm that you want to format the drive. 4 Reboot your system. To verify that the hard drive is formatted: 1 Log onto the appliance as root. At a console, type: # fdisk -1, then press Enter. Verify the existence of a device called sdc1. For example: Disk /dev/sda1: 255 heads, 63 sectors, 4462 cylinders Units = cylinders of * 512 bytes Disk /dev/sdb1: 255 heads, 63 sectors, 8924 cylinders Units = cylinders of * 512 bytes Disk /dev/sdc1: 255 heads, 63 sectors, 8924 cylinders Units = cylinders of * 512 bytes The devices in your system may have more storage than the example shown above, but if sdc1 does not appear, then confirm that the third drive is physically seated properly. 2 Type the command svhalt to shut down the system if you did not see sdc1. 3 Ensure the third drive is seated properly in its slot: a Push the release button beside the third hard drive (the one on the right). b Pull the handle gently to remove the third hard drive. c Push the third hard drive back into place. 54 Installing Securify Enterprise Reporting

55 Installation Guide What s Next? 4 Restart the system. As the appliance reboots, watch to see that all three hard drives are initialized. 5 Type the following commands, pressing Enter after each one: # mkdir -p /mnt/test # mount /dev/sdc1 /mnt/test # ls /mnt/test # umount /mnt/test If these commands are successful, the third disk is formatted, and backup can occur. Otherwise, you must format the hard drive. Note: You must complete the instructions provided herein to connect the ER Gateway and ER Warehouse appliances before you connect an ER Gateway to an Enterprise Manager. For instructions on upgrading Enterprise Reporting software, see Upgrading Securify Software on page 59. For information about configuring a Securify appliance for SSH access after installation, see Allowing SSH Access on page 57. For information about generating and installing certificates on Securify systems, see Managing Certificates on page 63. For information about Enterprise Reporting, see the Securify Enterprise Reporting Operations Guide. Warning: Before a planned service outage, Securify appliances should be safely powered down to avoid unexpected behavior when power is restored. Use the command svhalt to halt the system before pressing the power button. What s Next? 55

56 Securify 56 Installing Securify Enterprise Reporting

57 CHAPTER 6 Allowing SSH Access You can allow Secure Shell (SSH) access for secure access to a Securify appliance. The instructions in this chapter apply to all Securify server products. When you install a Securify server product, RSA-based authentication is enabled by default. Important: You can use either public key or password authentication for SSH access. Check with your security administrator to determine which method is recommended or permitted by your organization. If you are using public key method, you must place your public key on the system before you attempt SSH access. Allowing SSH Access 57

58 Securify To place the public key on your appliance: 1 Log on as svs at the system console. From the console, create this file (and the directory if necessary) if it does not already exist: /home/svs/.ssh/authorized_keys 2 Set permissions on this file so that you can edit it, but no one else can read it. For example, chmod -R 0700 /home/svs/.ssh /home/svs/.ssh/authorized_keys 3 Using an editor, append your public key to the end of authorized_keys. For example, to edit the file using vi, type vi /home/svs/.ssh/authorized_keys To allow SSH access: 1 Log on to the console as root and run the command editsvnetwork.pl. The script displays the network information dialog. 2 Using the mouse or the space bar, select SSH enabled in IPTABLES. An [x] appears to signify it is enabled. 3 If you want to require SSH password authentication, use the mouse or the space bar to select that option. 4 Select <SAVE> to save your changes and close the file. Note: Experienced system administrators may attempt to edit the SSH server configuration manually, though this is not recommended. Due to the security concerns around manually editing the SSH server configuration file, it is strongly recommended that the root user not be granted remote access. The root user s password can be subject to a bruteforce attack, if SSH password authentication is enabled for that user and the strict password policy feature is not enabled. Since svs is a known account, its password can also be attacked, if the strict password policy feature is not enabled. If successful, an attacker with physical access could use this information to directly access the Securify appliance. Access via SSH enables an attacker to gain direct access to the database as it only listens locally on the loop-back address. The attacker can then gain total control of the local database. 58 Allowing SSH Access

59 APPENDIX A Upgrading Securify Software The instructions in this appendix apply to Securify Monitor, Monitor SE, Monitor LE, Monitor LE-50, Enterprise Manager, Enterprise Manager SE, Enterprise Global, and Enterprise Reporting (ER Gateway and ER Warehouse). They do not apply to Studio. Securify periodically releases software updates. Updates are available only from Securify, and are cryptographically signed to ensure that only authorized updates are applied to the Securify system. You typically receive an update on CD or from the my.securify.com Web site. Important: Review the Release Notes that accompany the update for important information such as an estimate of how long the update process may take, dependencies for the update and in what sequence you should perform the tasks necessary for an update. Depending on the specific software update, the update process may involve rebooting the appliance. If necessary, the update program handles logging you off, and rebooting the appliance. Upgrading Securify Software 59

60 Securify To upgrade Securify software: Note: These instructions do not apply to the ER Warehouse. For those instructions, see To upgrade ER Warehouse software: on page Log on to the Web interface of the appliance as a Securify administrator. 2 Click Manage > Configure and then select the name of the Securify appliance you are upgrading to display that appliance s configuration screen. 3 Click the Software Update tab (a Monitor is used in this example). 4 Click Browse, navigate to the upgrade file, then click Open. 5 Click Upload on the Software Upgrade for <machine name> page. To verify the upgrade, check the version tag by clicking Manage > Status, then selecting the machine name, and then clicking the Version link. Note: An Enterprise Manager must be at the same or higher version number than its client Monitors to avoid incompatibilities and issues. To upgrade Securify software on all Monitors: 1 Log on to the Enterprise Manager that manages the Monitors you are upgrading, then click Manage > Configure. 2 Click the Enterprise Manager name in the Configure Systems tree to display the configuration page. 3 Click Software Update: All Monitors. 4 Browse to the upgrade file, then click Upload. 60 Upgrading Securify Software

61 Installation Guide To upgrade ER Warehouse software: 1 Log on to the ER Warehouse, then click Manage to display the Security Zone access/software Update page. 2 Click Software Update. 3 Click Browse and select the software update file. 4 Type your login password in the space labeled Please re-enter your login password. 5 Click Apply to start the software update process. 61

62 Securify 62 Upgrading Securify Software

63 APPENDIX B Managing Certificates Securify systems authenticate by means of self-signed certificates that are created when you install a system. In most cases, you do not need to manage a system's certificates. This appendix describes how to enforce the use of certificates in an organization that requires the use of certificates and administers full Public Key Infrastructure (PKI). Managing Certificates with the Web Application on page 64 Generating a New Self-signed Certificate on page 66 Uploading a Signed Certificate and Private Key on page 67 Uploading an NMSS Client Certificate on an Enterprise Manager on page 68 Requiring Client Certificates on page 69 Connecting with Signed Certificates on page 71 Managing Certificates for Connections on page 79 Managing Certificates 63

64 Securify Managing Certificates with the Web Application Certificates enable the Securify system to identify servers and users prior to authentication. The Certificates page (Manage > Certificates) page enables you to: Generate and install a new self-signed certificate Import a signed certificate with its private key and the certificate authority s (CA) root certificate Enforce client certificates for connection identification Remove all root certificate authority (CA) certificates Upload a Negative Model Subscription Service certificate, allowing for the automatic update of exploit signatures and related security information around host and network vulnerabilities. You can manage certificates through the Web interface of Enterprise Global, ER Gateway, all Monitor types, and all Enterprise Manager types. Use the command-line instructions given throughout this chapter to manage certificates on the ER Warehouse. Important: Many of the actions made available on the Certificates page restart the server. All current user sessions closed, and users must wait until the server restarts before reauthenticating if they wish to continue their work. To view the Certificates page: 1 Log on to the Web Application as a user with SV Manager permissions, then click Manage >Certificates to display the Certificates page. If you are accessing a Monitor, you are able to upload server certificates or generate a self-signed certificate. See Figure B-1 on page 65. On an Enterprise Manager, you can also upload the NMSS Client Certificate for package auto-update. See Figure B-2 on page 65. Note this feature is not available on other systems such as the Monitor product line. 64 Managing Certificates

65 Installation Guide Figure B-1: Certificates tab of a Monitor Figure B-2: Upload NMSS client certificate portion for the Certificates page of an Enterprise Manager Managing Certificates with the Web Application 65

66 Securify Generating a New Self-signed Certificate The self-signed certificate generated at install time uses the machine s IP address as the certificate common name. To generate a self-signed certificate with a different common name from the default, create a new certificate using the Generate a self-signed certificate section of the certificate management page. Type the desired common name and click the Generate button. This overwrites any previously-installed certificate and restarts the system. To modify attributes other than the common name of a new self-signed certificate, a command-line tool is provided. Log in to the application s console or connect by way of SSH, and run the command: sudo create-self-signed-cert This program prompts the user to type the required attributes for the new certificate, such as the size of the private key. The new certificate is created and installed, and the user is prompted to restart system services manually. If you want to have the new certificate signed by your organization s certificate authority, a certificate signing request for the new certificate is available at: /www/conf/ssl.crt/new.cert.csr 66 Managing Certificates

67 Installation Guide Uploading a Signed Certificate and Private Key To use certificates signed by a certificate authority (CA), include the signed certificate and its private key in a PKCS#12 file. The filename ends with.pfx or.p12. Optionally, a PKCS #12 file can also include one or more CA certificates (see Requiring Client Certificates on page 69). The currently-installed server key and certificate (self-signed or otherwise) as well as any CA certificates are replaced by those in the PKCS#12 file, and the system is restarted. To upload a signed certificate: 1 Log on to the Web interface of an appliance as a user with SVManager permissions, click Manage > Certificates. 2 Click Browse in the Upload server certificates section to locate your signed certificate s PKCS#12 file. Note: If you have files in PEM format, see Converting PEM to PKCS#12 below for information on converting your files. 3 Type the certificate s passphrase in the appropriate text field, then click Upload. The server restarts, ending all active user sessions. Converting PEM to PKCS#12 If you have certificates and keys in PEM format, you can use the openssl command-line tool available on most modern UNIX-based systems (including Securify appliances) to convert to PKCS#12 format. To convert certificates and keys in PEM format to PKCS#12: At a command prompt, run the command: openssl pkcs12 -export -in certificate.crt -inkey certificate.key -out certificate.p12 Alternatively, most Web browsers can import certificates with their keys and export them in PKCS#12 format. See your browser s documentation for details. Uploading a Signed Certificate and Private Key 67

68 Securify Uploading an NMSS Client Certificate on an Enterprise Manager This function is only available on Enterprise Manager systems. To enable Negative Model Subscription Service (NMSS) automatic update, a valid NMSS client certificate must be installed. Uploading the NMSS client certificate does not affect the server certificate. To import a Negative Model certificate: 1 Log on to the Web Application as a user with SVManager permissions, click Manage > Certificates. 2 Click Browse in the Upload NMSS client certificate section to locate your NMSS certificate. 3 Type the certificate s passphrase in the appropriate text field, then click Upload. After restarting, if your Enterprise Manager can reach the Internet it attempts to auto-update itself every four hours as future Negative Model packages are published to Securify s Security Best Practice Services Web site (also available to a properly enabled browser as 68 Managing Certificates

69 Installation Guide Requiring Client Certificates You can force anyone connecting to a Securify appliance to use a client certificate. When you require client certificates on a Securify appliance, a user connecting to that appliance through the Web interface or Studio must have a client certificate either imported into their browser, or loaded into Studio to gain access to the appliance s data. For more information, see Updating a Computer Running Studio on page 77. Note: If you enforce client certificates on a Securify appliance, the appliance must have one or more root CAs installed, which are typically imported into the system as part of the server s signed certificate in PKCS#12 format. Use the Certificates page of the appliance s Web interface to enable or disable client certificate authentication. There is an Enable button if certificates are not required, or a Disable button if they are required. If no CA certificates are installed, the Client certificate authentication section of the certificate management page does not appear. Any CA certificates currently installed at the time of a server s PKCS#12 installation is replaced by the certificates in the uploaded file. For information on uploading the file, follow the procedures in Uploading a Signed Certificate and Private Key on page 67. Requiring Client Certificates 69

70 Securify Installing any CA certificates enforces client certificate authentication for Studio connections. To also enable client certificate authentication on the WebUI, click the Enable button on the Client certificate authentication section. To disable client certificate authentication, click the Disable button. To disable client certificate authentication for Studio connections, all CA certificates must be removed. To do so, upload a PKCS #12 file including only the server certificate and key with no CA certificates. If it becomes impossible to log in to the Web Application due to the client certificates requirement, client certificate authentication can be disabled at the command line with: sudo /opt/svs/system/emuiscripts/configure/require-client-certs no The system restarts and client certificates are no longer required for the appliance s Web Application access. To view any uploaded certificate authority certificates: Click the Certificate Authorities button. 70 Managing Certificates

71 Installation Guide Connecting with Signed Certificates When you install a signed certificate on a Securify appliance, you must install the root CA certificate on all Securify appliances to which it is connected and on any computers running Studio if you require client certificates for authentication. For example, if you install a signed certificate on a Monitor connected to an Enterprise Manager, you must also install the root CA certificate on the Enterprise Manager. If you install a signed certificate on an Enterprise Manager, you must also install the root CA certificates on each of the Monitors connected to it. Updating a Monitor Connected to an Enterprise Manager After you install a signed certificate on a Monitor (including Monitor LE or Monitor LE-50), you must also install the root CA certificate on the Securify Enterprise Manager that manages it. You must then update the Monitor s certificate information on the Enterprise Manager. For more information, see Identifying Enterprise Manager on a Monitor and Adding a Monitor to Enterprise Manager (Security Zone) in the chapter on configuring of the Securify Web Application Operations Guide. To update a Monitor connected to an Enterprise Manager: 1 Log on to the Monitor as a user with SVManager permissions, click Manage > Certificates. 2 Follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing a PKCS #12 file that includes the appropriate root CA certificate. The Monitor restarts automatically. 3 Log back on to the Enterprise Manager as a user with SVManager permissions, click Manage and then Certificates. 4 Click Certificate Authorities. If the root CA for the other machine s new signed certificate does not appear in the list, then follow the procedures in Uploading a Signed Certificate and Private Key on page 67. The Enterprise Manager restarts automatically. 5 Still logged into the Enterprise Manager, click Manage > Configure and then select the Monitor from the Configure Systems list. 6 Click Update Certificate to obtain the new certificate from the Monitor. 7 Click Accept Certificate. After 5 minutes, the Monitor should connect back to the Enterprise Manager with its new signed certificate. Connecting with Signed Certificates 71

72 Securify Updating an ER Gateway Connected to an Enterprise Manager After you install a signed certificate on an ER Gateway, you must also install the root CA certificate on the Enterprise Manager. You must then update the ER Gateway s certificate information on the Enterprise Manager. To update an ER Gateway connected to an Enterprise Manager: 1 Log on to the ER Gateway as a user with SVManager permissions, click Manage > Certificates. 2 Follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing a PKCS #12 file that includes the appropriate root CA certificate. The ER Gateway restarts automatically. 3 Log on to the Enterprise Manager as a user with SVManager permissions, click Manage > Certificates. 4 Click the Certificate Authorities button. If the root CA for the other machine s new signed certificate does not appear in the list, then follow the procedures in Uploading a Signed Certificate and Private Key on page 67. The Enterprise Manager restarts automatically. 5 Still logged on to the Enterprise Manager, click Manage > Access > Add Machine to display the Create New Machine Profile page. 6 Log on to the ER Gateway (in a second browser window), click Manage, then Configure and then select the ER Gateway to display the ER Gateway s Configuration page. Copy these two pieces of information Managing Certificates

73 Installation Guide 7 Copy the ER Gateway s new Certificate Common Name and Certificate Hash. Paste them in the Enterprise Manager s Create New Machine Profile page....paste ER Gateway information here. 8 Click Add Machine Profile. After 5 minutes, the ER Gateway should connect back to the Enterprise Manager with its new signed certificate. 9 Once connectivity is shown to be successful, find the old machine access profile for the ER Gateway on the Enterprise Manager and delete it. Connecting with Signed Certificates 73

74 Securify Updating an Enterprise Manager Connected to Another Securify Appliance After you install a signed certificate on an Enterprise Manager, you must also install the root CA certificate on all Monitors, Monitor LEs, Monitor LE-50s, ER Gateways, and Enterprise Globals connected to the Enterprise Manager. You must then update the Enterprise Manager s certificate information on each connected appliance. To update an Enterprise Manager connected to another Securify appliance: 1 Log on to the Enterprise Manager as a user with SVManager permissions, click Manage > Certificates. 2 Follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing the new signed certificate with key and root CA in the form of a PKCS #12 file. The Enterprise Manager restarts automatically. 3 Log on to the Web Application, as a user with SV Manager permissions, for each Monitor, ER Gateway, and Enterprise Global connected to the Enterprise Manager. 4 Click Manage > Certificates in the Web interface of each appliance. 5 Click the Certificate Authorities button. If the root CA for the other machine s new signed certificate does not appear in the list, then follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing a PKCS #12 file that includes the appropriate root CA certificate. The appliance restarts automatically. 6 For each Monitor connected to the Enterprise Manager, log on to the Web interface, click Manage > Access > Add Machine. For an ER Gateway or an Enterprise Global, skip to step Log on to the Enterprise Manager in a second browser window, click Manage > Configure. 8 Select the Enterprise Manager to display the configuration page. 74 Managing Certificates

75 Installation Guide Copy these two pieces of information... 9 Copy the Enterprise Manager s new Certificate Common Name and Certificate Hash. Paste them in the Create New Machine Profile page. 10 Click Add Machine Profile. After 5 minutes, the appliance you are working with should connect back to the Enterprise Manager with its new signed certificate. 11 Find the old machine access profile for the Enterprise Manager on the Monitor and delete it once you verify connectivity is successful. 12 (For ER Gateway and Enterprise Global only) Log onto the ER Gateway or Enterprise Global in a separate browser window, click Manage > Configure, and then select the Enterprise Manager. 13 (For ER Gateway and Enterprise Global only) Click Accept Certificate and confirm that you want to accept the certificate. After 10 to 15 minutes, the Enterprise Manager should connect back to the ER Gateway or Enterprise Global with its new signed certificate. Connecting with Signed Certificates 75

76 Securify Updating an Enterprise Global Connected to an Enterprise Manager After you install a signed certificate on an Enterprise Global, you must also install the root CA certificate on it. You must then update the Enterprise Global s certificate information on the Enterprise Manager. To update an Enterprise Global connected to an Enterprise Manager: 1 Log on to the Enterprise Global as a user with SVManager permissions, click Manage > Certificates. 2 Follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing a PKCS #12 file that includes the appropriate root CA certificate. The Enterprise Global restarts automatically. 3 Log on to the Enterprise Manager as root. 4 Click the Certificate Authorities button. If the root CA for the other machine s new signed certificate does not appear in the list, then follow the procedures in Uploading a Signed Certificate and Private Key on page 67 for importing a PKCS #12 file that includes the appropriate root CA certificate. The Enterprise Manager restarts automatically. 5 Log on to the Enterprise Manager, click Manage > Access > Add Machine to display the Create New Machine Profile page. 6 Log on to the Enterprise Global in a second browser window, click Manage > Configure. 7 Click on the Enterprise Global in the Configure Systems list to display the Enterprise Global s Configuration page. Copy these two pieces of information Managing Certificates

77 Installation Guide 8 Copy the Enterprise Global s new Certificate Common Name and Certificate Hash. Paste them in the Enterprise Manager s Create New Machine Profile page. 9 Click Add Machine Profile. After 5 minutes, the Enterprise Global should connect back to the Enterprise Manager with its new signed certificate. 10 Find the old machine access profile for the Enterprise Global on the Enterprise Manager and delete it once connectivity is proven successful. Updating a Computer Running Studio After you install a signed certificate on a stand-alone Monitor (including Monitor LE or Monitor LE-50) or Enterprise Manager, and you require client certificates for authentication from Studio, you must also install the root CA certificate on all computers running Studio and synchronize the certificate hash for Studio users on the appliance and for the client certificate on the computer running Studio. 1 Open Studio and click File > Certificates > Manage CA Root Certificates. to display the Manage CA Root Certificates dialog. 2 Import the new CA root certificate. Connecting with Signed Certificates 77

78 Securify 3 Click File > Certificates > View Certificates and open the client certificate that matches the new root CA certificate. Keep the dialog open as you need the certificate s Common Name (CN) and hash to synchronize with a Studio user in the Web interface of an appliance. 4 Log on to the appliance to which you want Studio to connect and create a new user. For information on creating users, see Managing Users and Machines Access Tab in the chapter on Managing a Securify System of the Securify Web Application Operations Guide. a Set the user name to the CN of the certificate. b Set the authorization type to SHA1_certificate_hash. c Copy the hash from the View Certificates dialog (step 3 above) and paste it into the appropriate fields for the new user. 5 Repeat the previous steps for any appliances to which you want Studio to connect. If you do not have a different CA root certificate for each appliance, you can skip steps 1 and 2. 6 Create a new connection to each appliance to which you want Studio to connect. For information on connections, see Managing Connections in the chapter on Studio Basics of the Securify Studio User Guide. 78 Managing Certificates

79 Installation Guide Managing Certificates for Connections In the Connection List dialog, (Figure B-3) you are able to select or remove a certificate for a connection. Note: For information on managing Connections, see Managing Connections in the Studio Basics chapter of the Securify Installation Guide. Figure B-3: Connection List dialog To select a certificate for a connection: 1 Click the row of the appropriate connection and then click the open folder icon to display the Select Certificate dialog (Figure B-4). 2 Browse to the appropriate directory and then click the file name. Figure B-4: Select Certificate dialog with file selected Managing Certificates for Connections 79

80 Securify 3 Type your credentials as necessary to view the contents of the file. 4 Click Select. The directory path appears next to the icons in the Cert column. To remove a certificate for a connection: Click the row of the appropriate connection in the Connection List dialog (Figure B-3) and then click the trashcan icon. 80 Managing Certificates

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0 Clearswift SECURE Exchange Gateway Installation & Setup Guide Version 1.0 Copyright Revision 1.0, December, 2013 Published by Clearswift Ltd. 1995 2013 Clearswift Ltd. All rights reserved. The materials

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

@ptitude Observer. Installation Manual. Part No. 32170700 Revision G

@ptitude Observer. Installation Manual. Part No. 32170700 Revision G Part No. 32170700 Revision G Installation Manual Copyright 2012 by SKF Reliability Systems All rights reserved. Aurorum 30, 977 75 Lulea Sweden Telephone: +46 (0) 31 337 10 00, Fax: +46 (0) 920 134 40

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Server Management 2.0

Server Management 2.0 Server Management 2.0 Installation and Configuration Guide Server Management 2.0 and Higher May 2008 . unisys imagine it. done. Server Management 2.0 Installation and Configuration Guide Server Management

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express ArcGIS 9 Installation Guide: Workgroup for Microsoft SQL Server Express Copyright 2006 ESRI All Rights Reserved. Printed in the United States of America. The information contained in this document is the

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

20487B: Developing Windows Azure and Web Services

20487B: Developing Windows Azure and Web Services 20487B: Developing Windows Azure and Web Services Microsoft Hyper-V Classroom Setup Guide Contents Introducing Microsoft Hyper-V 1 Setup Overview 2 Activating Windows 8 Virtual Machines 2 Rearming Windows

More information

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

Installation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software

Installation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software Installation & Upgrade Guide Hand-Held Configuration Devices Mobility DHH820-DMS Mobility DHH820-DMS Device Management System Software WARNING notices as used in this manual apply to hazards or unsafe

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1 EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

RSA Security Analytics. S4 Broker Setup Guide

RSA Security Analytics. S4 Broker Setup Guide RSA Security Analytics S4 Broker Setup Guide Copyright 2010-2013 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Ipswitch WS_FTP Server

Ipswitch WS_FTP Server Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Upgrading to Document Manager 2.7

Upgrading to Document Manager 2.7 Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Symantec NetBackup Appliance Getting Started Guide

Symantec NetBackup Appliance Getting Started Guide Symantec NetBackup Appliance Getting Started Guide Release 2.0 NetBackup 5200 and 5220 The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All

More information

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc. User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to

More information